14. Authentication Sequence 3. Check The Server Key 2. Split The Key Image 1. Password Reveals Crypto Elements
15. Authentication Sequence 3. Check The Server Key 2. Split The Key Image 4. Send Client Left Side to Institution & Check Institution Signature 1. Password Reveals Crypto Elements
16. Authentication Sequence 3. Check The Server Key 2. Split The Key Image 4. Send Client Left Side to Institution & Check Institution Signature 5. Send Right Side to Client & Check User Signature 1. Password Reveals Crypto Elements
17. Man in the Middle 1. Hacker re-routes DNS to phishing site
18. Man in the Middle (2) 2. Password Reveals Crypto 1. Hacker re-routes DNS to phishing site
19. Man in the Middle (3) 3. Check The Server Key 2. Password Reveals Crypto 1. Hacker re-routes DNS to phishing site
20. Man in the Middle (4) 3. Check The Server Key 4. Hacker’s Key is Wrong! 5. Plug-in displays Phishing Warning 2. Password Reveals Crypto 1. Hacker re-routes DNS to phishing site 6. Fraud Ticket is transmitted to clearing house